1. Threat / Log analytics In 2017, you would think every company with sensitive data, apps, or on premise servers would be collecting logs. That is not the case, a lot of companies have been attacked and it seems the hackers leave without a trace. So what are logs? According to Wikipedia. In computing, a…